The Obama administration now is turning its cybersecurity focus on a new part of the private sector. And it’s putting the charge in the Commerce Department’s lap to initiate discussions and convene decision-makers.

“This space is everything from small shops that are startups and have an online presence to large companies having social networking sites, but are not considered infrastructure but still are vital to the economy,” said Ari Schwartz, the Internet Policy Advisor for the National Institute of Standards and Technology, in an interview with Federal News Radio. “What we are trying to do is eventually build some kind of codes of conduct. In order to get there, we need to start to impress and build a better array of standards and best practices in this space and really try to get the companies in this space to implement what are known security standards.”

Advertisement

The report lists several security standards, such as Domain Name System Security (DNSec) or IP security (IPSec), which Schwartz said are on the “edge of critical mass” across the private sector. Commerce’s goal is to help reach that critical mass so more and more companies are taking steps to secure their computers and systems.

Commerce recommended improved methods for authenticating identity instead of passwords, which are easily stolen or hacked. It also emphasized using technology to make sure when users type in a Web address they actually go to that site rather than being hijacked.

Commerce also wants to develop incentives to encourage companies to buy security software and services. One idea is to give the companies that invest in better cybersecurity less legal liability if they are a victim of hacking.

The latest report builds on NSTIC and adds to the effort to create, what many administration officials have called, a cyber ecosystem.

“In this space, we have much more of a question of how we will work with non-covered critical infrastructure,” Schwartz said. “DHS plays some role, but there is a role for NIST and Commerce to work more closely with these companies too.”

NIST will play a convening role, similar to what it is doing under NSTIC.

Schwartz said NIST is encouraging companies, experts and the general public to comment on the strategy, answer the assorted questions and comment on the security standards the report highlights.

He said NIST will issue a Federal Register notice by Monday giving the public 45 days to comment. Then by the fall, NIST will determine which standards it will bring working groups around for both short term and long term decisions and create a white paper.

The strategy also addresses education to target awareness and training, and research and development goals, standards and policies that support innovation and economic growth.

NIST’s role would include bridging gaps in security protection by developing guidelines and promote the development of security assurance standards such as Common Criteria, which is used to assess the security of products.

Commerce received positive feedback from industry groups and from the privacy and security community.

The Center for Democracy and Technology applauded the strategy for defining every day consumer services and not lumping them in with critical infrastructure.

“There is still a great deal of work to be done, including developing the contours of the government’s limited role in securing the Internet, Innovation and Information sector,” said Gregory Nojeim, director of CDT’s Project on Security, Freedom and Technology. “Moreover, there remains the huge, unanswered question of what should be the government’s role in securing the Internet itself, whether it is deemed critical or non-critical.”

The Software and Information Industry Association (SIIA) said the strategy also was a positive step toward a balanced international cybersecurity policy.

“This is a productive first attempt to define the sector,” said Mark MacCarthy SIIA vice president for public policy in a statement. “We appreciate the focus on services and functionalities as an attempt to more clearly define the line between covered critical infrastructure and the other parts of the Internet economy. SIIA also welcomes the call for the development and utilization of voluntary reasonable security practices by this sector. In fact, the industry already complies with a large number of industry-specific and international security standards.”

(Copyright 2011 by FederalNewsRadio.com. All Rights Reserved.)

This story is part of Federal News Radio’s daily Cybersecurity Update. For more cybersecurity news, click here.